Text Material Preview
of Netskope, Inc. All other trademarks are trademarks of their respective owners. 06/18 DS-10-8 REAL-TIME AND API PROTECTION Options More than 3,000 pre-defined data identifiers Fingerprinting and Exact Match capabilities* Perform secondary DLP analysis for content leveraging on-premises DLP solution Custom profiles & regular expressions Rules support global identifiers and severity levels Multi-data identifier classification with Boolean operations Pattern & keyword matching Hundreds of industry standard DLP categories Further increase coverage with OCR to extend DLP policies to images* File Types Inspection for more than 1,000 file types Supported Regulations Leverage dozens of pre-defined policy templates to identify sensitive data in accordance with regulations. Templates include (but are not limited to): AMRA, EC Directive, EU-GDPR, GLBA, HIPAA, PCI-DSS, PHI, PII, PHIPA,PIPEDA, SSN Confidentiality Act, US FTC Rules, etc. Non-regulated Data Types Intellectual property data Financial and legal terms National ID numbers International Bank Account Numbers (IBAN) CONTEXT AWARE Policy Is Enforced On Users, user groups, organization unit, custom user list Applications, application instances, application categories File sharing options File types and size Activity types: Upload, download, view, post, send and share Device types: Desktop or mobile Device classification: Managed and unmanaged devices Location types: On-premises and remote Geo location: Source and destination Operating system and browser Sync client INCIDENT MANAGEMENT AND REMEDIATION Complete Context and Visibility of the Violation Forensic information of excerpts of the violation Get granular alerts of violations in SkopeIT DLP and Compliance based reports Incident Workflow Assign incidents to investigate override severity Customizable status for workflows Remediation Workflow Contact the owner Quarantine and restore Restrict file permissions Automatic Policy Actions Alert, Block, Encrypt User Notification and Coaching (redirect to custom notice) Quarantine and Legal Hold Netskope DLP Features Netskope DLP is sold as a separate SKU and requires the purchase of the Netskope Security Cloud or at least one of Netskope’s API Protection SKUs (e.g., Netskope for Office 365). Netskope DLP is available in standard and advanced options. Features marked with an * are not available in standard. DATA VISIBILITY Whether it’s to satisfy auditing requirements, compliance, or just corporate security policies, it’s important to understand where your most sensitive data is flowing and how it’s being used. Netskope gives you a comprehensive understanding of not only all cloud activity, regardless of device, network, or location, but also allows you to identify all sensitive data flowing in the cloud and detect DLP violations with an all-mode architecture capable of covering all cloud traffic whether users are on premises or remote or on a web browser, mobile app, or sync client. This includes discovering sensitive data at rest in sanctioned services and en route to and from all services, sanctioned or unsanctioned.of Netskope, Inc. All other trademarks are trademarks of their respective owners. 06/18 DS-10-8 REAL-TIME AND API PROTECTION Options More than 3,000 pre-defined data identifiers Fingerprinting and Exact Match capabilities* Perform secondary DLP analysis for content leveraging on-premises DLP solution Custom profiles & regular expressions Rules support global identifiers and severity levels Multi-data identifier classification with Boolean operations Pattern & keyword matching Hundreds of industry standard DLP categories Further increase coverage with OCR to extend DLP policies to images* File Types Inspection for more than 1,000 file types Supported Regulations Leverage dozens of pre-defined policy templates to identify sensitive data in accordance with regulations. Templates include (but are not limited to): AMRA, EC Directive, EU-GDPR, GLBA, HIPAA, PCI-DSS, PHI, PII, PHIPA,PIPEDA, SSN Confidentiality Act, US FTC Rules, etc. Non-regulated Data Types Intellectual property data Financial and legal terms National ID numbers International Bank Account Numbers (IBAN) CONTEXT AWARE Policy Is Enforced On Users, user groups, organization unit, custom user list Applications, application instances, application categories File sharing options File types and size Activity types: Upload, download, view, post, send and share Device types: Desktop or mobile Device classification: Managed and unmanaged devices Location types: On-premises and remote Geo location: Source and destination Operating system and browser Sync client INCIDENT MANAGEMENT AND REMEDIATION Complete Context and Visibility of the Violation Forensic information of excerpts of the violation Get granular alerts of violations in SkopeIT DLP and Compliance based reports Incident Workflow Assign incidents to investigate override severity Customizable status for workflows Remediation Workflow Contact the owner Quarantine and restore Restrict file permissions Automatic Policy Actions Alert, Block, Encrypt User Notification and Coaching (redirect to custom notice) Quarantine and Legal Hold Netskope DLP Features Netskope DLP is sold as a separate SKU and requires the purchase of the Netskope Security Cloud or at least one of Netskope’s API Protection SKUs (e.g., Netskope for Office 365). Netskope DLP is available in standard and advanced options. Features marked with an * are not available in standard. DATA VISIBILITY Whether it’s to satisfy auditing requirements, compliance, or just corporate security policies, it’s important to understand where your most sensitive data is flowing and how it’s being used. Netskope gives you a comprehensive understanding of not only all cloud activity, regardless of device, network, or location, but also allows you to identify all sensitive data flowing in the cloud and detect DLP violations with an all-mode architecture capable of covering all cloud traffic whether users are on premises or remote or on a web browser, mobile app, or sync client. This includes discovering sensitive data at rest in sanctioned services and en route to and from all services, sanctioned or unsanctioned.